{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-8453","assignerOrgId":"cded6c7f-6ce5-4948-8f87-aa7a3bbb6b0e","state":"PUBLISHED","assignerShortName":"twcert","dateReserved":"2024-09-05T02:53:06.043Z","datePublished":"2024-09-30T07:12:14.782Z","dateUpdated":"2024-09-30T15:47:03.144Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"GS-4210-24PL4C hardware 2.0","vendor":"PLANET Technology","versions":[{"lessThan":"2.305b240719","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unaffected","product":"GS-4210-24P2S hardware 3.0","vendor":"PLANET Technology","versions":[{"lessThan":"3.305b240802","status":"affected","version":"0","versionType":"custom"}]}],"datePublic":"2024-09-30T07:09:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<span style=\"background-color: rgb(255, 255, 255);\">Certain switch models from PLANET Technology use an insecure hashing function to hash user passwords without being salted. Remote attackers with administrator privileges can read configuration files to obtain the hash values, and potentially crack them to retrieve the plaintext passwords.</span>"}],"value":"Certain switch models from PLANET Technology use an insecure hashing function to hash user passwords without being salted. Remote attackers with administrator privileges can read configuration files to obtain the hash values, and potentially crack them to retrieve the plaintext passwords."}],"impacts":[{"capecId":"CAPEC-55","descriptions":[{"lang":"en","value":"CAPEC-55 Rainbow Table Password Cracking"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":4.9,"baseSeverity":"MEDIUM","confidentialityImpact":"HIGH","integrityImpact":"NONE","privilegesRequired":"HIGH","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-328","description":"CWE-328 Use of Weak Hash","lang":"en","type":"CWE"}]},{"descriptions":[{"cweId":"CWE-759","description":"CWE-759: Use of a One-Way Hash without a Salt","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"cded6c7f-6ce5-4948-8f87-aa7a3bbb6b0e","shortName":"twcert","dateUpdated":"2024-09-30T07:12:14.782Z"},"references":[{"tags":["third-party-advisory"],"url":"https://www.twcert.org.tw/tw/cp-132-8055-2c361-1.html"},{"tags":["third-party-advisory"],"url":"https://www.twcert.org.tw/en/cp-139-8056-09688-2.html"}],"solutions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"Update firmware of GS-4210-24PL4C hardware 2.0 to version 2.305b240719 or later.<br>Update firmware of GS-4210-24P2S hardware 3.0 to version 3.305b240802 or later.<br>"}],"value":"Update firmware of GS-4210-24PL4C hardware 2.0 to version 2.305b240719 or later.\nUpdate firmware of GS-4210-24P2S hardware 3.0 to version 3.305b240802 or later."}],"source":{"advisory":"TVN-202409009","discovery":"EXTERNAL"},"title":"PLANET Technology switch devices - Weak hash for users' passwords","x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-09-30T15:44:24.842002Z","id":"CVE-2024-8453","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-09-30T15:47:03.144Z"}}]}}